Advanced Network Security: Application Layer Firewalls
This article explores the concept of application layer firewalls, how they work, their importance in network security, and some tools used to test them.
This article explores the concept of application layer firewalls, how they work, their importance in network security, and some tools used to test them.
This article provides a detailed overview of IoT security best practices and common vulnerabilities for an advanced audience of experienced security professionals, covering topics such as secure communication protocols, firmware updates, strong passwords, network segmentation, and more.
This article provides advanced technical details on Intrusion Prevention Systems (IPS), including what they are, how they work, tools and techniques for testing them, and specific examples of open source and commercial IPS systems.
This technical article provides a detailed overview of various techniques and tools that can be used to bypass firewalls, including examples and best practices for red teamers and pen testers.
Forget volumetric DDoS. The real damage happens inside the perimeter. We explore IPv6 shadow networks, NAC bypasses, and VLAN hopping techniques for the modern Red Team.